scholarly journals Nested Two-Layer RGB Based Reversible Image Steganography Method

2021 ◽  
Vol 50 (2) ◽  
pp. 264-283
Author(s):  
Ali Durdu

In this study, a new reversible image steganography method based on Red-Green-Blue (RGB) which hides thecolored image into the colored images in two layers nested is proposed. The proposed method hides the 24-bitimage to be hidden by hiding two layers of data firstly in the resized version of the cover image with the LSBmethod, and then hides the resized cover image to the original cover image with the 4-bit method. The proposedmethod offers a secure communication environment as it hides the hidden image in two layers. When thirdparties extract data by using the LSB method, they only access the resized version of the cover image. The 4-bitmethod divides the image to be hidden into 8-bit segments. While the first 4 bits, which are the most importantbits of 8-bit data, are hidden directly, 4 bits that can be neglected with less significance are completed by roundingat approximate value through the method function. In this way, since the 8-bit data is reduced to 4-bits, themethod performs lossy hiding, but doubles the hiding capacity. Peak signal to noise ratio (PSNR), structuralsimilarity quality criterion (SSIM) and chi-square steganalysis method, which are frequently used in the literature,are used to measure the immunity level of the proposed method. When it is concealed at the same ratewith the LSB method and the proposed method, a higher measurement value is obtained in the PSNR imagecriterion, which is 1.2 dB, SSIM 0.0025, BER 0.0129 and NCC image criterion 0.00027. In additional, it wasshown that the proposed method achieved more successful results in chi-square steganalysis and histogramtests compared to the traditional LSB method.

2018 ◽  
Vol 18 (1) ◽  
pp. 69-80 ◽  
Author(s):  
Aditya Kumar Sahu ◽  
Gandharba Swain ◽  
E. Suresh Babu

Abstract This article proposes bit flipping method to conceal secret data in the original image. Here a block consists of 2 pixels and thereby flipping one or two LSBs of the pixels to hide secret information in it. It exists in two variants. Variant-1 and Variant-2 both use 7th and 8th bit of a pixel to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the Variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, Peak Signal to Noise Ratio (PSNR), hiding capacity, and the Quality Index (Q.I) of the proposed techniques has been compared with the results of the existing bit flipping technique and some of the state of art article.


2013 ◽  
Vol 2013 ◽  
pp. 1-7 ◽  
Author(s):  
V. Thanikaiselvan ◽  
P. Arulmozhivarman ◽  
S. Subashanthini ◽  
Rengarajan Amirtharajan

Modern day information age is enriched with the advanced network communication expertise but unfortunately at the same time encounters infinite security issues when dealing with secret and/or private information. The storage and transmission of the secret information become highly essential and have led to a deluge of research in this field. In this paper, an optimistic effort has been taken to combine graceful graph along with integer wavelet transform (IWT) to implement random image steganography for secure communication. The implementation part begins with the conversion of cover image into wavelet coefficients through IWT and is followed by embedding secret image in the randomly selected coefficients through graph theory. Finally stegoimage is obtained by applying inverse IWT. This method provides a maximum of 44 dB peak signal to noise ratio (PSNR) for 266646 bits. Thus, the proposed method gives high imperceptibility through high PSNR value and high embedding capacity in the cover image due to adaptive embedding scheme and high robustness against blind attack through graph theoretic random selection of coefficients.


2019 ◽  
Vol 8 (4) ◽  
pp. 11473-11478

In recent days, for sending secret messages, we require secure internet. Image steganography is considered as the eminent tool for data hiding which provides better security for the data transmitted over internet. In the proposed work, the payload data is embedded using improved LSB-mapping technique. In this approach, two bits from each pixel of carrier image are considered for mapping and addition. Two bits of payload data can be embedded in one cover image pixel hence enhanced the hiding capacity. A logical function on addition is applied on 1st and 2nd bits of cover image pixel, and a mapping table is constructed which gives solution for data hiding and extraction. Simple addition function on stego pixel is performed to extract payload data hence increases the recovery speed. Here the secret data is not directly embedded but instead mapped and added with a number using modulo-4 strategy. Hence the payload data hidden using proposed approach provide more security and it can resist against regular LSB decoding approaches. The proposed work is implemented and tested for several gray scale as well as color images and compared with respect to parameters like peak signal to noise ratio and MSE. The proposed technique gives better results when compared and histogram of cover and stego images are also compared.


2021 ◽  
Author(s):  
Nandhini Subramanian ◽  
, Jayakanth Kunhoth ◽  
Somaya Al-Maadeed ◽  
Ahmed Bouridane

COVID pandemic has necessitated the need for virtual and online health care systems to avoid contacts. The transfer of sensitive medical information including the chest and lung X-ray happens through untrusted channels making it prone to many possible attacks. This paper aims to secure the medical data of the patients using image steganography when transferring through untrusted channels. A deep learning method with three parts is proposed – preprocessing module, embedding network and the extraction network. Features from the cover image and the secret image are extracted by the preprocessing module. The merged features from the preprocessing module are used to output the stego image by the embedding network. The stego image is given as the input to the extraction network to extract the ingrained secret image. Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) are the evaluation metrics used. Higher PSNR value proves the higher security; robustness of the method and the image results show the higher imperceptibility. The hiding capacity of the proposed method is 100% since the cover image and the secret image are of the same size.


Author(s):  
Aditya Kumar Sahu ◽  
Gandharba Swain

<p><strong>Notice of Retraction</strong><br /><br />-----------------------------------------------------------------------<br />After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles.<br /><br />We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.<br /><br />The presenting author of this paper has the option to appeal this decision by contacting [email protected].<br /><br />-----------------------------------------------------------------------</p><p>This article proposes bit flipping method to conceal secret data in the original image. Here a section consists of 2 pixels and there by flipping one or two LSBs of the pixels to hide secret information in it. It exists in 2 variants. The variant-1 and variant-2 both use 7<sup>th</sup> and 8<sup>th</sup> bit to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, peak signal to noise ratio (PSNR), hiding capacity, and the quality index of the proposed techniques has been compared with the existing bit flipping technique</p>


Image steganography is a technique that is used to hide information. The information can be of various types like image, video, or audio. Steganography is done so that no one apart from the correct receiver can retrieve the information. This paper consists of all advantages and highlights of the wavelet transform but with the additional features like randomness and some default values that are already built-in it. Various algorithms can be used in steganography and they provide good hiding capacity and low detectability. Here we have hidden the image into the cover image using Integer Wavelet Transform (IWT) and also using Discrete Wavelet Transform (DWT) and compared which technique gives better results. It is very difficult to predict the presence of a hidden image inside the stego image since it looks exactly like the cover image. There is no loss in quality from the secret image to the extracted image since the PSNR (Peak Signal to noise ratio) is high for both of them. This process was done using both DWT and IWT and the results prove that that the IWT technique is not only simpler but also more efficient than the DWT technique since it gives higher PSNR values. Through the proposed algorithm, an increase in the strength and imperceptibility is noticed and it can also maintain various transformations such as scaling, translation, and rotation with algorithms that already exist. The final results, after comparing both the transforms prove that the algorithm which is being proposed in IWT is indeed effective


The research constitutes a distinctive technique of steganography of image. The procedure used for the study is Fractional Random Wavelet Transform (FRWT). The contrast between wavelet transform and the aforementioned FRWT is that it comprises of all the benefits and features of the wavelet transform but with additional highlights like randomness and partial fractional value put up into it. As a consequence of the fractional value and the randomness, the algorithm will give power and a rise in the surveillance layers for steganography. The stegano image will be acquired after administrating the algorithm which contains not only the coated image but also the concealed image. Despite the overlapping of two images, any diminution in the grade of the image is not perceived. Through this steganographic process, we endeavor for expansion in surveillance and magnitude as well. After running the algorithm, various variables like Mean Square Error (MSE) and Peak Signal to Noise ratio (PSNR) are deliberated. Through the intended algorithm, a rise in the power and imperceptibility is perceived and it can also support diverse modification such as scaling, translation and rotation with algorithms which previously prevailed. The irrefutable outcome demonstrated that the algorithm which is being suggested is indeed efficacious.


2020 ◽  
Vol 10 (2) ◽  
Author(s):  
Yusliza Yusoff ◽  
Tassvini A/P Gunaseharan ◽  
Tassvini A/P Gunaseharan

Image steganography is a process of hiding message behind an image file which focuses on protecting the existence of a message secret. There is a security risk in the current image steganography process. Since stego-image will be transferred on unsecured Internet network, attackers will attack and try to decode the message behind the stego-image because of the vulnerable algorithm. Therefore, it is very important to search for a method to make the process of encoding the stego-image more secure. There are many algorithms developed to make the stego-image become more secured. However, the usage of Knight Tour (KT) and Rivest Cipher Four (RC4) algorithms in image steganography are still insufficient although that the algorithms are claimed to be secured and robust. KT algorithm is an easy mathematical technique that can increase the security of hidden information, meanwhile, RC4 is known as a simple algorithm but systematic in cover image programming. In this paper, the performance of KT and RC4 algorithms are observed to measure the security and robustness of JPG image format. Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) are used to observe the image quality to improve the security factor in the stego-image. From the results, it is found that KT generated better performance compared to RC4. 


Author(s):  
Oluwaseun M. Alade ◽  
Elizabeth A. Amusan ◽  
Oluyinka T. Adedeji ◽  
Oluwaseun O. Alo

Steganography deals with the ways of hiding communicated data in such a way that it remains confidential. Finding best position inside cover image to embed text message, maintaining a reasonable trade-off between security, robustness, higher bit embedding rate and imperceptibility are some of the challenges of steganography system. Hence, this paper presents firefly algorithm for finding best positions inside cover image in order to embed text message into cover image using Pixel Value Differencing (PVD) technique. Four different cover image was used. Experimental result showed the cover image with selected location using firefly algorithm as well as the stego image using PVD technique. The stego image was evaluated using Peak Signal to Noise Ratio (PSNR) and Mean square Error (MSE).  Firefly Algorithm with PVD technique produced a promising result for image steganography.


Sign in / Sign up

Export Citation Format

Share Document